Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

CISA adds two n-able n-central flaws to a known exploited vulnerability catalog

Elon Musk’s Xai co-founder leaves the company

Pebble smartwatch is back: Pebble Time 2 specifications revealed

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Researchers discovered malware in fake Discord Pypi packages downloaded more than 11,500 times
Identity

Researchers discovered malware in fake Discord Pypi packages downloaded more than 11,500 times

userBy userMay 7, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 7, 2025Ravi LakshmananSoftware Supply Chain/Malware

Discord Pypi Package

Cybersecurity researchers have discovered malicious packages in the Python Package Index (PYPI) repository.

The package in question is DiscordpyDebug, which was uploaded to Pypi on March 21, 2022. It has been downloaded 11,574 times and is still available in the open source registry. Interestingly, the package has not been updated since.

“At first glance, it looked like a simple utility aimed at developers working on Discord Bots using the discord.py library,” the Socket Research team said. “However, the package hid a fully functional remote access trojan.”

Cybersecurity

Once the package is installed, it will contact an external server (“Backstabprotection.jamesx123.Repl)[.]Includes CO”), and the ability to read and write any file based on commands received from the server, ReadFile, or WriteFile. The rat also supports the ability to execute shell commands.

In short, DiscordpyDebug is used to read sensitive data such as configuration files, tokens, and credentials, tamper with existing files, download additional payloads, and run commands to run the data.

“The code doesn’t include any persistence or privilege escalation mechanisms, but its simplicity is particularly effective,” Socke said. “Outbound HTTP polling, rather than inbound connections, allows you to bypass most firewalls and security monitoring tools, especially in uncontrolled development environments.”

The development comes as software supply chain security companies have also discovered packages over 45 npm that pretend to be legitimate libraries available in other ecosystems as a way to install and install developers. Some of the things to note are listed below –

beautifulsoup4 (beautifulsoup4 python library type scut) apache-httpclient (apache httpclient java library type scut) opentk (opentk .net library type scut) Seaborn (same bone python library type scut)

Cybersecurity

All identified packages are known to point to the same IP address despite sharing the same infrastructure, using similar obfuscated payloads, and listing different maintainers.

“The packages identified as part of this campaign contain obfuscation code designed to bypass security measures, run malicious scripts, remove sensitive data, and maintain the persistence of affected systems,” says Socket.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleIsraeli attacks kill at least 31 as Gaza blockade accelerates starvation | Israeli-Palestinian conflict news
Next Article Warriors’ Stephen Curry was injured in one game win against the Timberwolves | Basketball News
user
  • Website

Related Posts

CISA adds two n-able n-central flaws to a known exploited vulnerability catalog

August 14, 2025

New PS1bot malware campaign deploys in-memory attacks in multistage using Malvertisingising

August 13, 2025

Zoom and Xerox releases critical security update fix privilege escalation and RCE flaws

August 13, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

CISA adds two n-able n-central flaws to a known exploited vulnerability catalog

Elon Musk’s Xai co-founder leaves the company

Pebble smartwatch is back: Pebble Time 2 specifications revealed

Humanity’s nabs Humanloop team as a competition for enterprise AI talents gets hot

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The Next Frontier: NYC Island Becomes Epicenter for Climate Solutions

The AI-Powered Career Path: How TwinH by FySelf Evolves Your Digital Professional Identity

Web 3.0 Gets Personal: FySelf’s TwinH Paves the Way for User-Controlled Digital Identity

Google’s Genie 3: The Dawn of General AI?

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.